* Thomas Roessler ([EMAIL PROTECTED]) [000128 09:57]:
> > Why not simply list all the matching keys, and then let the user
> > choose one of those, and then let gpg do the valitify check on
> > it's own?
> 
> First of all, it may quite well be possible that there is a unique
> key matching an e-mail address with a fully valid user id to key
> association.  In this case, there is no need to ask the user.

True, never actually seen it happen tho :)

> Then, the software should tell the user about the validity of the
> keys it presents to him.

GPG will do that for you. And in any case, you should not do a validity
check until *after* the user have selected which key to use.

> > How about DSS/DH? 95% of the keys around are DSS/DH keys.
> 
> I don't need 99.999% or so of the keys around.  Fortunately, most of
> those people I communicate with using PGP belong to the 5% of PGP
> users having RSA keys.
> 
> (For the rest, I keep copies of pgp5 and gpg around.)

Sounds good.

Terje Elde
-- 
Xlehveh rhkau fudwuh få mydtemi dåh tk aqd rhkau jyt få kdyn (jyt ==
fudwuh?)

Reply via email to